-
1261
Precise Retrieval of Sentinel-1 Data by Minimizing the Redundancy With Greedy Algorithm
Published 2024-01-01“…Aiming to address this issue, we present here an optimized retrieval method grounded in a greedy algorithm, which can substantially reduce redundant data by approximately 20–65% while ensuring comprehensive data coverage over the areas of interest. …”
Get full text
Article -
1262
Grouped Byzantine fault tolerant consensus algorithm based on aggregated signatures
Published 2025-07-01“…Experimental results show that the GABFT algorithm significantly improves system throughput and scalability while reducing latency and communication overhead, making it well-suited for large-scale networks.…”
Get full text
Article -
1263
Image forgery detection algorithm based on U-shaped detection network
Published 2019-04-01“…Aiming at the defects of traditional image tampering detection algorithm relying on single image attribute,low applicability and current high time-complexity detection algorithm based on deep learning,an U-shaped detection network image forgery detection algorithm was proposed.Firstly,the multi-stage feature information in the image by using the continuous convolution layers and the max-pooling layers was extracted by U-shaped detection network,and then the obtained feature information to the resolution of the input image through the upsampling operation was restored.At the same time,in order to ensure higher detection accuracy while extracting high-level semantic information of the image,the output features of each stage in U-shaped detection network would be merged with the corresponding output features through the upsampling layer.Further the hidden feature information between tampered and un-tampered regions in the image upon the characteristics of the general network was explored by U-shaped detection network,which could be realized quickly by using its end-to-end network structure and extracting the attributes of strong correlation information among image contexts that could ensure high-precision detection results.Finally,the conditional random field was used to optimize the output of the U-shaped detection network to obtain a more exact detection results.The experimental results show that the proposed algorithm outperforms those traditional forgery detection algorithms based on single image attribute and the current deep learning-based detection algorithm,and has good robustness.…”
Get full text
Article -
1264
Key frame extraction algorithm for surveillance videos using an evolutionary approach
Published 2025-01-01“…Existing methods include the Adaptive Key Frame Extraction Algorithm, which reduces redundancy while ensuring maximum content coverage; the Optimal Key Frame Extraction Algorithm, which utilizes a Genetic Algorithm (GA) to select key frames optimally; and the Rapid Key Frame Extraction Algorithm, which employs clustering techniques to identify typical key frames. …”
Get full text
Article -
1265
Image forgery detection algorithm based on U-shaped detection network
Published 2019-04-01“…Aiming at the defects of traditional image tampering detection algorithm relying on single image attribute,low applicability and current high time-complexity detection algorithm based on deep learning,an U-shaped detection network image forgery detection algorithm was proposed.Firstly,the multi-stage feature information in the image by using the continuous convolution layers and the max-pooling layers was extracted by U-shaped detection network,and then the obtained feature information to the resolution of the input image through the upsampling operation was restored.At the same time,in order to ensure higher detection accuracy while extracting high-level semantic information of the image,the output features of each stage in U-shaped detection network would be merged with the corresponding output features through the upsampling layer.Further the hidden feature information between tampered and un-tampered regions in the image upon the characteristics of the general network was explored by U-shaped detection network,which could be realized quickly by using its end-to-end network structure and extracting the attributes of strong correlation information among image contexts that could ensure high-precision detection results.Finally,the conditional random field was used to optimize the output of the U-shaped detection network to obtain a more exact detection results.The experimental results show that the proposed algorithm outperforms those traditional forgery detection algorithms based on single image attribute and the current deep learning-based detection algorithm,and has good robustness.…”
Get full text
Article -
1266
Comparative Analysis of Supervised Classification Algorithms for Residential Water End Uses
Published 2024-06-01Get full text
Article -
1267
Algorithm and mathematical model for geometric positioning of segments on aspherical composite mirror
Published 2018-09-01“…This approach allows: to expand the spectral operating range from 0.2 to 11.0 μm and to increase the diameter of the entrance pupil of the receiving optical system, while maintaining the optimal value of the exponent mS– mass per unit area.Two variants of adjusting the position of mirror segments are considered when forming an aspherical surface of the second order, with respect to the base surface of the nearest sphere, including geometrical and opto-technical positioning.The purpose of the research was to develop an algorithm for solving the problem of geometric positioning of hexagonal segments of a mirror telescope, constructing an optimal circuit for traversing elements when aligning to the nearest radius to an aspherical surface, and also to program the output calculation parameters to verify the adequacy of the results obtained.Various methods for forming arrays from regular hexagonal segments with equal air gaps between them are considered. …”
Get full text
Article -
1268
Insulator Defect Detection Algorithm Based on Improved YOLOv11n
Published 2025-02-01Get full text
Article -
1269
Pulmonary Nodules Detection Algorithm Combining Multi-view and Attention Mechanism
Published 2022-12-01Get full text
Article -
1270
Advancing Rice Disease Detection in Farmland with an Enhanced YOLOv11 Algorithm
Published 2025-05-01“…The algorithm offers significant advantages in lightweight design and real-time performance, outperforming other classical object detection algorithms and providing an optimal solution for real-time field diagnosis.…”
Get full text
Article -
1271
Traffic simulation optimization considering driving styles
Published 2025-12-01“…Moreover, the Bayesian optimization algorithm is modified in conjunction with a microscopic traffic simulation model to perform automatic calibration of expected speeds. …”
Get full text
Article -
1272
CRASHWORTHINESS DESIGN AND OPTIMIZATION FOR COLLISION POST OF TRAIN
Published 2022-01-01“…Based on the optimal Latin hypercube experimental design method, a polynomial response surface surrogate model of the specific energy absorption and the peak crush force with respect to the wall thickness of the novel multi-cell collision post was established, the multi-objective optimization problem was conducted using the Non-dominated Sorting Genetic Algorithm-Ⅱ and the Pareto front was obtained. …”
Get full text
Article -
1273
A Novel Connected-Components Algorithm for 2D Binarized Images
Published 2025-06-01“…While other binary-optimized algorithms, such as Bit-Run Two-Scan and Bit-Merge Run Scan, are up to 45% faster than our algorithm, they require much higher memory usage. …”
Get full text
Article -
1274
Efficient CNN architecture with image sensing and algorithmic channeling for dataset harmonization
Published 2025-03-01“…An integrated channeled algorithm processes the refined features by uniting local-global features with primitive-parameterized features and regioned feature vectors. …”
Get full text
Article -
1275
A deep learning-based algorithm for the detection of personal protective equipment.
Published 2025-01-01Get full text
Article -
1276
A highly generalized federated learning algorithm for brain tumor segmentation
Published 2025-07-01“…Empirical experiments validate the proposed algorithm, showing a 2.2% improvement in the Dice Similarity Coefficient (DSC) for brain tumor segmentation over the baseline federated learning algorithm, with a marginal 3% reduction in performance compared to centralized training, highlighting its practical applicability.…”
Get full text
Article -
1277
A Deep Learning-Based Algorithm for Ceramic Product Defect Detection
Published 2025-06-01“…In the field of ceramic product defect detection, traditional manual visual inspection methods suffer from low efficiency and high subjectivity, while existing deep learning algorithms are limited in detection efficiency due to their high complexity. …”
Get full text
Article -
1278
Image Similarity Quantum Algorithm and Its Application in Image Retrieval Systems
Published 2025-01-01“…It is found that the AE-QIP algorithm achieves comparable precision to the ST-QIP algorithm while exhibiting significant reductions in qubit consumption and average processing time. …”
Get full text
Article -
1279
Motion control and singular perturbation algorithms for lower limb rehabilitation robots
Published 2025-05-01“…An optimal S-type planning algorithm is proposed, transforming the S-type planning into an iterative solution problem for efficient and accelerated trajectory planning using dynamic equations. …”
Get full text
Article -
1280
Development and Validation of an Ultrasound Imaging Algorithm for Structured Reporting in Testicular Pathology
Published 2025-04-01“…While the algorithm significantly improved standardization and diagnostic performance, some variability in sensitivity for less experienced evaluators highlights the need for further refinement. …”
Get full text
Article